Have you heard? Antivirus software is dead — at least according to Symantec, maker of Norton Antivirus. But they’re still making Norton Antivirus and want to sell it to you, so what does this statement even mean?
Sometimes it’s the big changes in a new OS that really grind your gears and, other times, it’s something as simple as finding the background color to be an eyesore. Let’s take a look at how you can easily change the background/accent color in Windows 8.
Browser extensions are pieces of code that run in your web browser. They can do malicious things like display ads, track your browsing, and capture your passwords and private data. A safe extension could automatically update and become malware.
Windows 8.1 and 8 brought big changes to Windows. Even the process of logging in and setting up user accounts is extremely different, with new types of user accounts and login options.
Web browsers are gaining more and more features websites can use, and with them come permission options. Your web browser has a variety of permissions you can apply to individual websites, restricting them in various ways.
Remote desktop software allows you to access your computer from another room or halfway around the world. You can also share your desktop with someone temporarily — ideal for remote tech support.
Portable applications allow you to move between computers, taking your applications and their settings with you on a USB stick. Portable VirtualBox allows you to create portable operating systems and run them on any PC.
Some Windows tablets have as little as 32 GB of internal storage, and future ones may only have 16 GB! This is extremely cramped for a large Windows system, so you’ll want to make the most of the little space available to you.
Most web browsers load Flash and other plug-in content as soon as you open a web page. Enable “click-to-play” plug-ins and your browser will load a placeholder image instead — click it to actually download and view the content.
With so much concern about government surveillance, corporate espionage, and everyday identity theft, it may seem surprising that so few people use encrypted email messages. Try using encrypted email and you’ll find it to be difficult and complicated to use.
Some Internet service providers have harsh restrictions on the amount of bandwidth you can use in a month, charging you extra if you go over your bandwidth cap. Other ISPs restrict traffic at certain hours — for example, offering unlimited bandwidth only at night.
Are you a frequent user of PowerShell, but always find yourself wishing you had a great quick reference sheet available? Then you will definitely love this bit of news! Microsoft has released an updated set of PowerShell quick reference guides so that you always have the information you need within easy reach!
If you use VirtualBox to run different operating systems on your computer, you may be wondering how to copy text from your host machine into the guest machine and vice versa. You may have thought that VirtualBox Guest Additions provides this feature, but it doesn’t.
Most computers ship with a single operating system, but you can have multiple operating systems installed on a single PC. Having two operating systems installed — and choosing between them at boot time — is known as “dual-booting.”
VirtualBox can boot virtual machines from USB flash drives, allowing you to boot a live Linux system or install an operating system from a bootable USB device. This option is well-hidden.
OpenOffice.org was once the open-source office suite of choice, but it fractured into two separate projects — Apache OpenOffice and LibreOffice. Never mind Oracle Open Office, which was actually a closed-source office suite and was discontinued.
Yes, there are some situations where you’ll want to regularly change your passwords. But those will probably be the exception rather than the rule. Telling typical computer users they need to regularly change their passwords is a mistake.
Putting your computer to sleep overnight to save energy and resume your work first thing in the morning is a handy trick, but what if your computer wakes itself up early like an energetic toddler? Read on as we help a fellow reader figure out what exactly is waking his PC up.
iTunes uses an authorization system to ensure only a handful of computers can access your purchased music, videos, and other content at any given time. You should deauthorize iTunes before getting rid of a computer or reinstalling Windows.
Running applications as a standard user without elevated privileges is good security practice, but what about those times where an application will only work if it is run as an administrator? Read on as we highlight how to easily and permanently set an application to run with administrative privileges.
Windows 8.1 is a free upgrade to all Windows 8 users, but you normally can’t install Windows 8.1 with a Windows 8 product key. Luckily, you can get around this limitation if you really want a fresh install of Windows 8.1.
Considering that DOS was a single-tasking OS and the ties it had with early versions of Windows, just how did earlier versions of Windows manage to accomplish multi-tasking? Today’s SuperUser Q&A post looks at the answers to this question.
Most of the time we go to great pains to preserve formatting in our text and ensure it looks just the way we want it to. What if you’re frequently pasting text and you want to strip the formatting away in the process? Read on as we help a reader tweak his workflow to be faster and more streamlined.
Windows 8.1 allows you to limit and monitor data usage, which isn’t just useful if you have a Windows tablet or laptop with mobile data. It’s also useful if you’re tethering your PC to your smartphone.
If you use Windows 8.1 on the desktop, you can’t ignore the new “Windows 8-style” interface entirely. There are some important options you can only access from the PC Settings app, not the desktop Control Panel.